|
Hypervisor interrupt enables
19 messages
I expect, and have observed in Spike, that `sstatus.SIE` will apply to interrupts delegated to HS-mode, and `vsstatus.SIE` will apply to interrupts delegated to VS-mode. But I cannot find this explain
I expect, and have observed in Spike, that `sstatus.SIE` will apply to interrupts delegated to HS-mode, and `vsstatus.SIE` will apply to interrupts delegated to VS-mode. But I cannot find this explain
|
By
Scott Johnson
·
|
|
Clarification on writing MXL field of the MISA CSR
2 messages
Hi All, On a 64-bit implementation RISCV that supports a writable XML field in the MISA CSR and that supports writing 1 to that field (to turn on 32-bit mode), if we apply section 2.4 (CSR width modul
Hi All, On a 64-bit implementation RISCV that supports a writable XML field in the MISA CSR and that supports writing 1 to that field (to turn on 32-bit mode), if we apply section 2.4 (CSR width modul
|
By
Joseph Rahmeh
·
|
|
Clarification on writing MXL field of the MISA CSR
Hi All, On a 64-bit implementation RISCV that supports a writable XML field in the MISA CSR and that supports writing 1 to that field (to turn on 32-bit mode), if we apply section 2.4 (CSR width modul
Hi All, On a 64-bit implementation RISCV that supports a writable XML field in the MISA CSR and that supports writing 1 to that field (to turn on 32-bit mode), if we apply section 2.4 (CSR width modul
|
By
Joseph Rahmeh
·
|
|
[RISC-V] [tech-unixplatformspec] [RISC-V] [tech-privileged] [Announcement] Successful KVM RISC-V bring up on FPGA (Rocket core with H extension)
3 messages
Sure. I will send that once I have the detailed instructions available in public domain. -- Regards, Atish
Sure. I will send that once I have the detailed instructions available in public domain. -- Regards, Atish
|
By
atishp@...
·
|
|
[EXTERNAL]Re: [RISC-V] [tech-privileged] Fast-track extension proposal for "Hardware Performance Monitor count overflow and mode-based event filtering"
11 messages
There was one item regarding the specification – what are the implications for H-extension? Since the H-extension is part of the privileged spec, I think it should be specified. I do have a descriptio
There was one item regarding the specification – what are the implications for H-extension? Since the H-extension is part of the privileged spec, I think it should be specified. I do have a descriptio
|
By
Sanjay Patel
·
|
|
Fast-track extension proposal for "Hardware Performance Monitor count overflow and mode-based event filtering"
20 messages
Hi all, Recently the TSC established a lightweight "fast track" architecture extension process that small, straightforward, relatively uncontentious arch extension proposals can utilize. This is the s
Hi all, Recently the TSC established a lightweight "fast track" architecture extension process that small, straightforward, relatively uncontentious arch extension proposals can utilize. This is the s
|
By
Greg Favor
·
|
|
[RISC-V] [tech-virt-mem] [RISC-V] [tech-privileged] SV32 and 34 bit address
This was just a question about existing behavior. It is unrelated to the ongoing security conversation on the virtual memory TG mailing list, if that's what you're asking. Dan
This was just a question about existing behavior. It is unrelated to the ongoing security conversation on the virtual memory TG mailing list, if that's what you're asking. Dan
|
By
Daniel Lustig
·
|
|
SV32 and 34 bit address
3 messages
I reused a topic title under https://github.com/riscv/riscv-isa-manual/issues/131 And also I attached some comments in section 4.4.1 of privileged spec those confused me so much, A. Sv39 implementatio
I reused a topic title under https://github.com/riscv/riscv-isa-manual/issues/131 And also I attached some comments in section 4.4.1 of privileged spec those confused me so much, A. Sv39 implementatio
|
By
Gracy Ge
·
|
|
epc increment in case of C.EBREAK
7 messages
Hello The Privileged spec says that "ECALL and EBREAK cause the receiving privilege mode’s epc register to be set to the address of the ECALL or EBREAK instruction itself, not the address of the follo
Hello The Privileged spec says that "ECALL and EBREAK cause the receiving privilege mode’s epc register to be set to the address of the ECALL or EBREAK instruction itself, not the address of the follo
|
By
Anne MERLANDE
·
|
|
Virtualization of "main memory" and "I/O" regions
5 messages
Hi all, The FENCE instruction exposes the difference between accesses to main memory and accesses to I/O devices via the predecessor and successor sets; however, the distinction is really only defined
Hi all, The FENCE instruction exposes the difference between accesses to main memory and accesses to I/O devices via the predecessor and successor sets; however, the distinction is really only defined
|
By
David Kruckemyer
·
|
|
[Announcement] Successful KVM RISC-V bring up on FPGA (Rocket core with H extension)
3 messages
Hi, We are glad to announce that we are able to boot Linux in KVM guest on a FPGA (Rocket chip + H extension v0.6.1). We now have three hypervisors working on a Hardware with H extension. 1. KVM [1] 2
Hi, We are glad to announce that we are able to boot Linux in KVM guest on a FPGA (Rocket chip + H extension v0.6.1). We now have three hypervisors working on a Hardware with H extension. 1. KVM [1] 2
|
By
atishp@...
·
|
|
Proposal: Delegating Exceptions from VS-mode or VU-mode to U-mode
14 messages
Hi all, In this proposal, we extended N extension and applied it to H extension for improving the performance of virtual I/O devices in the virtualization scenario. We proposed a new mechanism to dele
Hi all, In this proposal, we extended N extension and applied it to H extension for improving the performance of virtual I/O devices in the virtualization scenario. We proposed a new mechanism to dele
|
By
Yifei Jiang
·
|
|
rv57k virtual address space
5 messages
attached is a proposal for the definition of RV57K. RV57K is an extension to RV57. the main extension is to incorporate two HARDWARE registers. These registers are used to partition user and kernel ad
attached is a proposal for the definition of RV57K. RV57K is an extension to RV57. the main extension is to incorporate two HARDWARE registers. These registers are used to partition user and kernel ad
|
By
swallach
·
|
|
[RISC-V] [tech-fast-int] [RISC-V] [tech-privileged] Resumable NMI proposal
3 messages
My concern is that if an RNMI occurs during an exception handler, and the RNMI handler encounters an exception, the exception return point. cause, and prev. priv state is lost - that's fatal. It's als
My concern is that if an RNMI occurs during an exception handler, and the RNMI handler encounters an exception, the exception return point. cause, and prev. priv state is lost - that's fatal. It's als
|
By
Allen Baum
·
|
|
[RISC-V] [tech-fast-int] [RISC-V] [tech-privileged] Resumable NMI proposal
3 messages
One case where NMIs are used on x86 for non-fatal conditions is for performance monitoring. If an operating system wants to accurately measure its own performance, then ideally it should be able to sa
One case where NMIs are used on x86 for non-fatal conditions is for performance monitoring. If an operating system wants to accurately measure its own performance, then ideally it should be able to sa
|
By
Jonathan Behrens
·
|
|
Resumable NMI proposal
3 messages
1. I think some of the questions and discussion concerning this proposal have arisen because the proposal is a little too terse. It would be helpful to have more about the specific use cases that the
1. I think some of the questions and discussion concerning this proposal have arisen because the proposal is a little too terse. It would be helpful to have more about the specific use cases that the
|
By
John Hauser
·
|
|
[RISC-V] [tech-fast-int] [RISC-V] [tech-privileged] Resumable NMI proposal
5 messages
I am assuming here that NMI is an interrupt, not an exception. Both trap, but an mmie-bit only affects interrupts, not exceptions. So, on entry, the handler knows if this was caused by an NMI or by an
I am assuming here that NMI is an interrupt, not an exception. Both trap, but an mmie-bit only affects interrupts, not exceptions. So, on entry, the handler knows if this was caused by an NMI or by an
|
By
Allen Baum
·
|
|
[RISC-V] [tech-fast-int] [RISC-V] [tech-privileged] Resumable NMI proposal
Could you go into more detail on how nesting NMIs could work? Shouldn't it only be safe to execute MNRET with rnmie clear, because any NMI that came in between setting mnepc and executing MNRET would
Could you go into more detail on how nesting NMIs could work? Shouldn't it only be safe to execute MNRET with rnmie clear, because any NMI that came in between setting mnepc and executing MNRET would
|
By
Jonathan Behrens
·
|
|
MPIE and MPP update when returning from interrupt with MRET
4 messages
Hello The privileged architecture says that when returning from interrupt with MRET, MPIE is set to 1 (and MPP is set to U). What is the rational behind ? Is it still in the context of supporting nest
Hello The privileged architecture says that when returning from interrupt with MRET, MPIE is set to 1 (and MPP is set to U). What is the rational behind ? Is it still in the context of supporting nest
|
By
Anne MERLANDE
·
|
|
ePMP update
Hi TEE group, I would like to give a quick update on ePMP spec. Public review We are still waiting for unpriv group to approve new CSR address assignment. It’s been pending for a while because there’r
Hi TEE group, I would like to give a quick update on ePMP spec. Public review We are still waiting for unpriv group to approve new CSR address assignment. It’s been pending for a while because there’r
|
By
Joe Xie
·
|